An evaluation of clustering technique over intrusion detection system
暂无分享,去创建一个
[1] Zhong-Yang Xiong,et al. Distributed intrusion detection based on clustering , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[2] N. B. Anuar,et al. Identifying False Alarm for Network Intrusion Detection System Using Hybrid Data Mining and Decision Tree , 2008 .
[3] James C. Bezdek,et al. Extending fuzzy and probabilistic clustering to very large data sets , 2006, Comput. Stat. Data Anal..
[4] Hui Wang,et al. A clustering-based method for unsupervised intrusion detections , 2006, Pattern Recognit. Lett..
[5] International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013, Mysore, India, August 22-25, 2013 , 2013, ICACCI.
[6] Ujjwal Maulik,et al. Performance Evaluation of Some Clustering Algorithms and Validity Indices , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[7] Vipin Kumar,et al. Chameleon: Hierarchical Clustering Using Dynamic Modeling , 1999, Computer.
[8] Taher Niknam,et al. An Efficient Hybrid Evolutionary Algorithm for Cluster Analysis , 2008 .
[9] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[10] Salvatore J. Stolfo,et al. Real time data mining-based intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[11] S. Sathya Bama,et al. Network Intrusion Detection using Clustering: A Data Mining Approach , 2011 .
[12] Taeshik Shon,et al. A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..